咨询与建议

限定检索结果

文献类型

  • 22,879 篇 会议
  • 9,164 篇 期刊文献
  • 64 篇 学位论文

馆藏范围

  • 32,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,066 篇 工学
    • 10,144 篇 计算机科学与技术...
    • 4,897 篇 电气工程
    • 3,148 篇 软件工程
    • 2,691 篇 信息与通信工程
    • 1,964 篇 控制科学与工程
    • 740 篇 机械工程
    • 683 篇 电子科学与技术(可...
    • 605 篇 航空宇航科学与技...
    • 535 篇 仪器科学与技术
    • 230 篇 交通运输工程
    • 212 篇 材料科学与工程(可...
    • 196 篇 化学工程与技术
    • 171 篇 生物工程
    • 156 篇 测绘科学与技术
    • 137 篇 土木工程
    • 135 篇 生物医学工程(可授...
    • 133 篇 动力工程及工程热...
  • 10,465 篇 理学
    • 9,398 篇 数学
    • 877 篇 物理学
    • 768 篇 系统科学
    • 742 篇 统计学(可授理学、...
    • 265 篇 生物学
    • 236 篇 化学
    • 127 篇 地球物理学
  • 2,499 篇 管理学
    • 1,934 篇 管理科学与工程(可...
    • 676 篇 工商管理
    • 559 篇 图书情报与档案管...
  • 418 篇 经济学
    • 387 篇 应用经济学
  • 211 篇 医学
    • 175 篇 临床医学
  • 180 篇 法学
    • 167 篇 社会学
  • 128 篇 文学
  • 128 篇 农学
  • 37 篇 教育学
  • 27 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 32,107 篇 approximation al...
  • 2,737 篇 algorithm design...
  • 2,351 篇 optimization
  • 2,306 篇 approximation me...
  • 2,175 篇 heuristic algori...
  • 1,424 篇 linear programmi...
  • 1,418 篇 convergence
  • 1,280 篇 computational mo...
  • 1,216 篇 resource managem...
  • 1,142 篇 signal processin...
  • 957 篇 computer science
  • 914 篇 clustering algor...
  • 914 篇 polynomials
  • 911 篇 complexity theor...
  • 789 篇 mathematical mod...
  • 753 篇 vectors
  • 710 篇 programming
  • 653 篇 estimation
  • 621 篇 training
  • 614 篇 transportation

机构

  • 97 篇 univ maryland de...
  • 68 篇 technion israel ...
  • 55 篇 univ waterloo de...
  • 49 篇 cornell univ dep...
  • 44 篇 tsinghua univers...
  • 39 篇 national institu...
  • 39 篇 carnegie mellon ...
  • 38 篇 iit dept comp sc...
  • 35 篇 national mobile ...
  • 34 篇 shandong univ sc...
  • 32 篇 sichuan univ col...
  • 31 篇 school of comput...
  • 31 篇 nanjing univ sta...
  • 29 篇 univ chinese aca...
  • 29 篇 technion haifa
  • 29 篇 princeton univ p...
  • 29 篇 suny stony brook...
  • 28 篇 epfl
  • 28 篇 hong kong polyte...
  • 28 篇 tel aviv univers...

作者

  • 64 篇 woodruff david p...
  • 64 篇 ravi r.
  • 52 篇 kortsarz guy
  • 45 篇 lee euiwoong
  • 43 篇 levin asaf
  • 41 篇 chan timothy m.
  • 40 篇 kumar amit
  • 37 篇 chen zhi-zhong
  • 36 篇 friggstad zachar...
  • 33 篇 kawarabayashi ke...
  • 32 篇 manurangsi pasin
  • 31 篇 wang lusheng
  • 31 篇 chalermsook pari...
  • 30 篇 gudmundsson joac...
  • 29 篇 thai my t.
  • 29 篇 williamson david...
  • 29 篇 carmi paz
  • 28 篇 saha barna
  • 28 篇 zenklusen rico
  • 27 篇 dinitz michael

语言

  • 31,278 篇 英文
  • 679 篇 其他
  • 115 篇 中文
  • 9 篇 日文
  • 8 篇 俄文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"主题词=approximation algorithms"
32107 条 记 录,以下是4521-4530 订阅
排序:
Online Federated Composite Optimization with Multiple Kernels
Online Federated Composite Optimization with Multiple Kernel...
收藏 引用
Asian Control Conference
作者: Haibao Tian Xiuxian Li Min Meng Zhen DONG Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China College of Electronics and Information Engineering Tongji University Shanghai China Suzhou SEEExTECH Co. Ltd SEEExTECH Suzhou China
This paper focuses on Online Federated Composite Optimization (OFCO) problem, where the loss function con-tains a non-smooth regularizer and the network environment is time-varying. This problem is prevalent in variou... 详细信息
来源: 评论
Fully Privacy-Preserving and Efficient Clustering Scheme based on Fully Homomorphic Encryption
Fully Privacy-Preserving and Efficient Clustering Scheme bas...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Mengyu Zhang Long Wang Xiaoping Zhang Yisong Wang Wenhou Sun Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Fully Homomorphic Encryption is a cryptographic scheme to prevent the privacy leakage of sensitive data. However, one challenge with FHE is the ciphertext comparison widely used in clustering, an important scheme used... 详细信息
来源: 评论
Dynamic Computing Power Wavelength Allocation Based on Deep Q-Learning for WDM-PON
Dynamic Computing Power Wavelength Allocation Based on Deep ...
收藏 引用
OptoElectronics and Communications Conference, OECC
作者: Wenbo Lin Tiankuo Yu Hui Yang Qiuyan Yao Chen Zhang Jie Zhang StateKey Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing China
This paper proposes a dynamic computing power wavelength allocation scheme based on deep Q-learning for WDM-PON, which can reduce spectrum fragmentation during massive computing power requests. Without introducing del... 详细信息
来源: 评论
approximation algorithms for the Stochastic Lot-Sizing Problem with Order Lead Times
收藏 引用
OPERATIONS RESEARCH 2013年 第3期61卷 593-602页
作者: Levi, Retsef Shi, Cong MIT Alfred P Sloan Sch Management Cambridge MA 02139 USA Univ Michigan Ann Arbor MI 48109 USA
We develop new algorithmic approaches to compute provably near-optimal policies for multiperiod stochastic lot-sizing inventory models with positive lead times, general demand distributions, and dynamic forecast updat... 详细信息
来源: 评论
Collaborative Multi-Agent Jamming Deceiving for UAV-assisted Wireless Communications
Collaborative Multi-Agent Jamming Deceiving for UAV-assisted...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Chen Zhang Zhenyu Xiao Lingfeng Zhang Guangyao Liu Wei Zhang Xiang-Gen Xia School of Electronic and Information Engineering Beihang University Beijing China School of Electrical Engineering and Telecommunications University of New South Wales Sydney NSW Australia Department of Electrical and Computer Engineering University of Delaware Newark DE USA
A reactive jamming attack, which performs spectrum jamming only during legal signal transmission based on the knowledge of user behaviors, poses a significant threat to wireless communications. In this paper, a novel ... 详细信息
来源: 评论
Matrix Profile XXXI: Motif Discovery Made Faster
Matrix Profile XXXI: Motif Discovery Made Faster
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Maryam Shahcheraghi Chin-Chia Michael Yeh Yan Zheng Junpeng Wang Zhongfang Zhuang Liang Wang Mahashweta Das Eamonn Keogh University of California Riverside Visa Research Foster City USA
Approximately repeated subsequences in a longer time series, i.e., time series motifs, are important primitive in time series data mining. Motifs are used in dozens of downstream tasks, including classification, clust... 详细信息
来源: 评论
Parallel approximations for High-Dimensional Multivariate Normal Probability Computation in Confidence Region Detection Applications
Parallel Approximations for High-Dimensional Multivariate No...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiran Zhang Sameh Abdulah Jian Cao Hatem Ltaief Ying Sun Marc G. Genton David E. Keyes Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Statistics Program King Abdullah University of Science and Technology Extreme Computing Research Center King Abdullah University of Science and Technology Thuwal Saudi Arabia Department of Mathematics The University of Houston Houston Texas USA
Addressing the statistical challenge of computing the multivariate normal (MVN) probability in high dimensions holds significant potential for enhancing various applications. For example, the critical task of detectin... 详细信息
来源: 评论
Image Encryption Algorithm Based on Matrix Semi-Tensor Product in DWT Domain
Image Encryption Algorithm Based on Matrix Semi-Tensor Produ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Jinwei Yu Junhai Zeng Man Li Wei Xie Langwen Zhang Yindong Lian China Telecom Research Institute Guangzhou China School of Automation Science and Engineering South China University of Technology Guangzhou China Southern Power Grid Supply Chain Technology (Guangdong) Co. Ltd Guangzhou China
This paper proposed an image encryption method based on matrix semi-tensor product (STP) and discrete wavelet transform (DWT). Firstly, a two-dimensional chaotic system is utilized to produce random sequences. Secondl... 详细信息
来源: 评论
Directed Buy-at-Bulk Spanners
arXiv
收藏 引用
arXiv 2024年
作者: Grigorescu, Elena Kumar, Nithish Lin, Young-San Purdue University United States Melbourne Business School Australia
We present a framework that unifies directed buy-at-bulk network design and directed spanner problems, namely, buy-at-bulk spanners. The goal is to find a minimum-cost routing solution for network design problems that... 详细信息
来源: 评论
Scalable Approximate Butterfly and Bi-triangle Counting for Large Bipartite Networks
收藏 引用
Proceedings of the ACM on Management of Data 2023年 第4期1卷 1-26页
作者: Fangyuan Zhang Dechuang Chen Sibo Wang Yin Yang Junhao Gan The Chinese University of Hong Kong Hong Kong Hong Kong Hamad Bin Khalifa University Doha Qatar University of Melbourne Melbourne VIC Australia
A bipartite graph is a graph that consists of two disjoint sets of vertices and only edges between vertices from different vertex sets. In this paper, we study the counting problems of two common types of em motifs in... 详细信息
来源: 评论